Download Publication

Who it's for:
CISOs / CTOs / CIOs
Security Architects
Application Developers
System and Security Administrators
Security Architects
Application Developers
System and Security Administrators
Corda Enterprise 4.8 - Security Controls Checklist
Release Date: 12/15/2021
Working Group: Blockchain/Distributed Ledger
In this spreadsheet, our Blockchain/Distributed Ledger Working Group delivers a fully implementable security controls checklist for the blockchain framework Corda Enterprise 4.8. These controls are aligned with the NIST Cybersecurity Framework’s controls to proactively prevent, detect and respond to the risks of Fabric 2.0, thus mitigating the business impacts downstream caused by loss of trade, trust, and ownership.
In the accompanying Corda Enterprises 4.8 - Architecture Security Report, we identify the cybersecurity risks of implementing Corda Enterprises 4.8’s architecture as a permissioned blockchain enterprise network for a trade finance business in a cloud-based environment. Steps 1-6 of the section "Threat Model Analysis as per STRIDE Model" explain in detail how this Security Controls Checklist was derived.
Key Takeaways:
- The description of each identified Corda Enterprise 4.8 vulnerability
- The description of each control that can be used to mitigate these vulnerabilities
- How the controls map to NISTv5(SP 800-53 Rev. 5), the standard reference for security controls
Download this Resource
Prefer to access this resource without an account? Download it now.
Related Resources
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more





